{"title":"Truthful Auction Mechanism for Data Trading with Share-Averse Data Consumers","authors":"Zhenni Feng, Qiyuan Wang, Yanmin Zhu","doi":"10.1109/MSN57253.2022.00075","DOIUrl":"https://doi.org/10.1109/MSN57253.2022.00075","url":null,"abstract":"In the paper we focus on a promising research problem of data trading, under the scenario that data items can be reproduced easily and inexpensively. Apart from a Bayesian optimal mechanism based data trading approach, we also propose a prior-free data trading approach to organize the data trading process between selfish data owners and share-averse data consumers, with the goal of maximizing revenue of data owners and meanwhile determining the optimal number of data copies. Rigorous theoretical analysis and extensive experiment results are offered to verify the effectiveness of proposed methods in terms of sum of valuations, revenue, individual rationality and incentive compatibility.","PeriodicalId":114459,"journal":{"name":"2022 18th International Conference on Mobility, Sensing and Networking (MSN)","volume":"24 ","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120977769","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Face Recognition Based Beauty Algorithm in Smart City Applications","authors":"Ming-Hon Tao, Kaiyan Lin","doi":"10.1109/MSN57253.2022.00104","DOIUrl":"https://doi.org/10.1109/MSN57253.2022.00104","url":null,"abstract":"Recently, social networking software is widespread used to achieve intelligent life in the construction of smart city, and sharing selfies on social platforms has been a trend of interaction. As a result, beauty software as a popular tool has been widely welcomed by social media users. Along with the development of beauty technology, the popular beauty software in the market include Qingyan, Meitu, VSCO and so on, whose functions continue to be expanded as users demand for image beautification. However, those functions tend to be manually adjusted by users, which would easily result in facial asymmetry. To address this issue, the principles and key points of several classical beauty algorithms are thoroughly investigated in this paper, such as skin beauty, beauty makeup, image artistry, portrait deformation and sharpening filter. In the experiments, the 68 face feature points in Dlib library are used to perform face detection and locate feature points, and Gaussian filtering, bilateral filtering, local translation and bilinear interpolation methods are used to realize the functions of these beauty algorithms. The analysis results have been shown to demonstrate the efficiency of the investigations.","PeriodicalId":114459,"journal":{"name":"2022 18th International Conference on Mobility, Sensing and Networking (MSN)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130624799","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"MSJAD: Multi-Source Joint Anomaly Detection of Web Application Access","authors":"Xinxin Chen, Jing Wang, Xing Wang, Chengsen Wang, Guosong Lv, Jiankun Li, Dewei Chen, Bo Wu, Lianyuan Li, Wei Yu","doi":"10.1109/MSN57253.2022.00080","DOIUrl":"https://doi.org/10.1109/MSN57253.2022.00080","url":null,"abstract":"Fixed broadband internet service can provide a stable broadband network of up to 100 megabits or even gigabits and users at home can use fixed broadband service for all kinds of internet surfing, including website and application access, watching videos, playing games, etc. Traditional maintenance for fixed broadband networks primarily uses human manual meth-ods, supplemented by some low-level semi-automation operations. Since the long processes with numerous network elements in the fixed broadband network, it is difficult for traditional operation and maintenance to support effectively with high quality. When abnormalities occur, it is quite manpower cost and time cost to monitor and locate faults. Therefore, to improve the autonomous capability of the fixed broadband network, intelligent operation and maintenance methods are necessary. First of all, a brand-new data pre-process method is proposed to detect anomalies and problems of slow access by selecting web services access commonly visited by users. Secondly, as the fixed broadband network is a multi-level and complex structure with only a small amount of anomaly sample data, we propose a multi-source joint anomaly detection model called MSJAD model on multi-dimensional features data. The model validation results on real datasets from the real fixed broadband network are state-of-the-art. The accuracy rate reaches 98 % and the recall is over 99 %. We have already begun to deploy the model on the real fixed broadband network and have achieved good feedback.","PeriodicalId":114459,"journal":{"name":"2022 18th International Conference on Mobility, Sensing and Networking (MSN)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129838150","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Rochishnu Banerjee, Md Fourkanul Islam, Shaswati Saha, V. Raychoudhury, Md Osman Gani
{"title":"Surface Recognition from Wheelchair-induced Noisy Vibration Data: A Tale of Many Cities","authors":"Rochishnu Banerjee, Md Fourkanul Islam, Shaswati Saha, V. Raychoudhury, Md Osman Gani","doi":"10.1109/MSN57253.2022.00103","DOIUrl":"https://doi.org/10.1109/MSN57253.2022.00103","url":null,"abstract":"Despite the active legislation in many countries supporting the accessibility of public spaces by mobility-impaired users, the reality is far from ideal. Wheelchair users often struggle to navigate the built environment let alone the natural areas. While barriers to wheeled mobility can be caused by broken/uneven surfaces, steep slopes, and unfavorable weather conditions, the effects of many such factors and others are not properly investigated. In this paper, we aim to classify various built and natural surfaces through their characteristic vibration patterns using different deep learning algorithms. The surface vibration data is collected from various cities in Europe (including Paris (FR), Mannheim (DE), Dresden (DE), Munich, Nuremberg (DE), and Salzburg (AT)) while a user drives a manual wheelchair attached with three differently oriented smartphones placed at different heights. Extensive experiments show that a Deep Neural Network model classifies surfaces using a denoised dataset with a 98.9% accuracy which is significantly higher than our previous state-of-the-art.","PeriodicalId":114459,"journal":{"name":"2022 18th International Conference on Mobility, Sensing and Networking (MSN)","volume":"81 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134018376","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"QP-LDP for better global model performance in federated learning","authors":"Qian Chen, Zheng Chai, Zilong Wang, Jiawei Chen, Haonan Yan, Xiaodong Lin","doi":"10.1109/MSN57253.2022.00074","DOIUrl":"https://doi.org/10.1109/MSN57253.2022.00074","url":null,"abstract":"With the deployment of local differential privacy (LDP), federated learning (FL) has gained stronger privacy-preserving capability against inference-type attacks. However, existing LDP methods reduce global model performance. In this paper, we propose a QP-LDP algorithm for FL to obtain a better-performed global model without losing privacy guarantees defined by the original LDP. Different from previous LDP methods for FL, QP-LDP improves the global model performance by precisely disturbing the non-common components of quantized local contributions. In addition, QP-LDP comprehensively protects two types of local contributions. Through security analysis, QP-LDP provides the probability indistinguishability of clients' private local contributions at a component-level. More importantly, ingenious experiments show that with the deployment of QP-LDP, the global model outperforms that in the original LDP-based FL in terms of prediction accuracy and convergence rate.","PeriodicalId":114459,"journal":{"name":"2022 18th International Conference on Mobility, Sensing and Networking (MSN)","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134299199","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"LoRaDrone: Enabling Low-Power LoRa Data Transmission via a Mobile Approach","authors":"Ciyuan Chen, Junzhou Luo, Zhuqing Xu, Runqun Xiong, Zhimeng Yin, Jingkai Lin, Dian Shen","doi":"10.1109/MSN57253.2022.00050","DOIUrl":"https://doi.org/10.1109/MSN57253.2022.00050","url":null,"abstract":"Low-Power Wide Area Networks (LPWANs) are widely used to connect large-scale Internet of Things (IoT) applications. Long Range (LoRa) is a promising LPWAN technology sensitive to energy consumption, since LoRa nodes are generally battery-powered, and the battery life will influence the lifetime of the LoRa network. In practice, the battery life of LoRa nodes is short in many scenarios, due to the long transmission distance form the gateway leading to high energy consumption. Existing techniques for energy-efficient data transmission mainly focus on static gateways, and will consume huge energy of remote nodes. In this paper, we propose to integrate LoRa with mobility to minimize the energy consumption of nodes by effectively shortening the transmission distances, and design the first mobile LoRa data transmission system called LoRaDrone by leveraging the unmanned aerial vehicle (UAV) gateway flying close to nodes. Specifically, we present a low-power communication mechanism and a dynamic channel allocation policy to minimize the energy consumed in sensing and communicating with the UAV gateway, while considering the distinctive LoRa parallel reception and complex transmission collisions. Then, an optimal speed scheduling strategy is designed to ensure the reliability of data transmission, and minimize the energy consumption of the UAV. Evaluations on various scales verify the effectiveness of LoRaDrone under different nodes' distributions and UAV paths. Compared with the baselines, the energy consumption of nodes using LoRaDrone is at most reduced by $mathbf{70.37}times$ at 5000 nodes.","PeriodicalId":114459,"journal":{"name":"2022 18th International Conference on Mobility, Sensing and Networking (MSN)","volume":"71 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133264042","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Zhiyang Liu, Ximin Yang, Wan Tang, Xiao Zhang, Zhen Yang
{"title":"BACO: A Bi-Ant-Colony-Based Strategy for UAV Trajectory Planning with Obstacle Avoidance","authors":"Zhiyang Liu, Ximin Yang, Wan Tang, Xiao Zhang, Zhen Yang","doi":"10.1109/MSN57253.2022.00055","DOIUrl":"https://doi.org/10.1109/MSN57253.2022.00055","url":null,"abstract":"Trajectory planning for a logistic delivery using an unmanned aerial vehicle (UAV) involves a typical traveling salesman problem (TSP), in which the turning of the UAV to avoid obstacles can cause significant energy consumption. The obstacles in the airspace and the angle constraints of the UAV must also be considered in the delivery. To address the low precision of UAV trajectory searches, and the serious impact of flight angles on UAV energy consumption, we propose a UAV trajectory planning strategy called bi-ant-colony optimization (BACO). BACO consists of two phases: path planning and track planning. By applying the guidance layer ant colony optimization (GuLACO) algorithm, the path planning phase eliminates the problem of ant colony deadlock that arises in multi-target point environments, and reopens the ant tabu table to search for a guidance path. Following this, the track planning phase employs the general layer ant colony optimization (GeLACO) algorithm to build the guidance path in segments. Furthermore, the precision of the flight heading for the UAV is optimized by adjusting the flight step in an adaptive manner, and obtaining fine-grained UAV flight tracks to control the turning angle of the logistics UAV. Our simulation results show that compared with the use of the greedy algorithm and the classical ACO algorithm, UAV trajectory planning using BACO can not only obtain shorter flight paths that take into account obstacle avoidance, but can also reduce the energy consumption of the UAV by finely controlling the amplitudes of the flight angles to ensure the safety and energy efficiency of UAV while in flight.","PeriodicalId":114459,"journal":{"name":"2022 18th International Conference on Mobility, Sensing and Networking (MSN)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123662065","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"MACC: MEC-Assisted Collaborative Caching for Adaptive Bitrate Videos in Dense Cell Networks","authors":"Haojia He, Songtao Guo, Lu Yang, Ying Wang","doi":"10.1109/MSN57253.2022.00046","DOIUrl":"https://doi.org/10.1109/MSN57253.2022.00046","url":null,"abstract":"Caching adaptive bitrate video at edge nodes (ENs) can provide multi-version video-on-demand (VoD) services to end users (EUs) with better experience. However, due to the limited cache capacity of ENs, it is important to decide which video content and corresponding bitrate version to be cached in the EN. In this paper, we first propose a user request hit profit (RHP) model, and then based on the RHP model we envision a mobile edge computing (MEC)-assisted collaborative caching scheme (MACC). Specifically, we model the communication links between ENs and EUs as a bipartite graph to employ the collaborative caching among ENs; and we consider the transcoding relationship between different versions to effectively utilize the processing capacity of ENs. Due to the NP-completeness of the cache placement problem, we prove it is a monotone submodular function maximization problem, and propose the proactive cache placement based on maximum RHP increment (PCP-MRI) algorithm and the reactive cache replacement based on maximum RHP increment (RCR-MRI) algorithm. Extensive simulation results show that, compared with existing methods, the proposed MACC has significant performance improvements in cache hit ratio, initial waiting delay and backhaul traffic load.","PeriodicalId":114459,"journal":{"name":"2022 18th International Conference on Mobility, Sensing and Networking (MSN)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127163637","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Minglong Cheng, G. Jia, Weidong Fang, Zhiwei Gao, Wuxiong Zhang
{"title":"SSA and BPNN Based Efficient Situation Prediction Model for Cyber Security","authors":"Minglong Cheng, G. Jia, Weidong Fang, Zhiwei Gao, Wuxiong Zhang","doi":"10.1109/MSN57253.2022.00131","DOIUrl":"https://doi.org/10.1109/MSN57253.2022.00131","url":null,"abstract":"Establishing an effective situation prediction model for cyber security can know the active situation of future network malicious events in advance, which plays a vital role in cyber security protection. However, traditional models cannot achieve sufficient prediction accuracy when predicting cyber situations. To solve this problem, the initial location information of the sparrow population is optimized, and a sparrow search algorithm based on the Tent map is proposed. Then, the BP neural network is optimized using the improved sparrow search algorithm. Finally, a situation prediction model based on the sparrow search algorithm and BP neural network is proposed, namely T-SSA-BPNN. The simulation results show that the convergence speed and global search ability of the prediction model are improved. It can effectively predict the network security situation with high accuracy.","PeriodicalId":114459,"journal":{"name":"2022 18th International Conference on Mobility, Sensing and Networking (MSN)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128943217","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Analytic Hierarchy Process Based Compatibility Measurement for RFID Protocols","authors":"Weiping Zhu, Changyu Huang, Chao Ma","doi":"10.1109/MSN57253.2022.00115","DOIUrl":"https://doi.org/10.1109/MSN57253.2022.00115","url":null,"abstract":"In recent years, radio frequency identification (RFID) based information query is widely used in many ap-plications. In order to meet various application requirements, different kinds of RFID protocols are proposed, such as ID collection, category estimation, and missing tag identification. We find that the structure and function used in these RFID protocols are quite similar. For example, empty slot skipping and collision slot reconciling are used in many protocols. An improvement in one protocol may also be applied in another protocol, or a combination of two compatible protocols can fulfill a new application requirement. However, currently there is no approach to measure the compatibility of two RFID protocols. In this study, we theoretically proposed the concept of RFID protocol compatibility and designed an approach to measure it. Analytic hierarchy process approach is revised for this purpose. The important features of an RFID protocol are identified, and then determine their weights according to their importance. The similarity of two protocols are computed by the weighted similarity of lowest level features. We validate this approach by using eight typical RFID protocols, and show useful information for the protocol design. For example, the results show the compatibility between CLS and SFMTI reaches 89.5 %, while the compatibility between CLS and TKQ is only 20.71 %, this conforms the characteristics of these protocols.","PeriodicalId":114459,"journal":{"name":"2022 18th International Conference on Mobility, Sensing and Networking (MSN)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129242361","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}